Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password

Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
WAN Final Matching
Your organization is issued the IPv6 prefix of 2001:0000:130F::/48 by your service provider. With this prefix, how many bits are available for your organization to create subnetworks?
16
When comparing DOCSIS and Euro-DOCSIS, what is the primary difference between the two specs?
Channel bandwidths
Which algorithm has encryption and decryption use different keys?
Asymmetric
Which two components should be taken into consideration when establishing a network baseline? (Choose two.)
1. information about the network design 2. expected performance under normal operating conditions
In which layer of the TCP/IP protocol model does IPsec apply security to network data?
Internet
Which algorithm has encryption and decryption use the same key?
Symmetric
If an admin chooses to avoid using NAT overload, what is the default timeout value for NAT translations?
One day.
Which algorithm uses RSA?
Asymmetric
A company is looking for the least expensive broadband solution that provides at least 10 Mb/s download speed. The company is located 5 miles from the nearest provider. Which broadband solution would be appropriate?
cable
When accommodating a teleworker, which type of connection should be used when mobile access during traveling is required and broadband options are available?
Dialup.
0:00

Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how
Created by: evilfrosty
Popular Computers sets